Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
c2ae1ec731bfbb6b0ee06a75961c230c.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c2ae1ec731bfbb6b0ee06a75961c230c.html
Resource
win10v2004-20240226-en
General
-
Target
c2ae1ec731bfbb6b0ee06a75961c230c.html
-
Size
7KB
-
MD5
c2ae1ec731bfbb6b0ee06a75961c230c
-
SHA1
1c6230eb488e8420da7033cb5859a9bfcda7ad86
-
SHA256
63efa0de3e938393f23b08dd967f0e525a44f26f4af5f4649b4f54a9c730e016
-
SHA512
ba12862f704888f26303048a9389ab222382d99e379b25d6a07dd02d3d39942e17b3239b0055f1e47b8f47892e86b5370a9e64a61bc35ebf231775ddd3b9fcf3
-
SSDEEP
96:4zWvP+YzY4ggpMmNTrj4Vj3ViEZIwLN0uumtnkR39oz/jRvg:4q3ptJNoTViIhuLQXRvg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b067129e4674da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416386797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b680c0140377d419b25a2af00a00fac0000000002000000000010660000000100002000000083f67c16e30f3474812f9c2ba61e49c4359a5bed34ed9749cee396426c2321d1000000000e8000000002000020000000d1ce54a5feb22eac80a2e45f4d6257e9b004416533bc919f42179c3d67033b57900000004f4b5479240b50f2b41c285adfa7235b2af913c5eb5d356ebc40ac833f60439e8c1bf1d3ac7db00e92ac9507a5d687c5f2327d01a12eb2cb26b7851b5231e762349e9709d724405ab583c528d3029b506e39b71182205d7df505d29efe16e4b4371aa57ff5a2c8781b5b546e260767f496dea7ead62e9aaa4a9c63f54d873aaa92f6733af5ec53a31978a82783b96e9140000000444a28a85e80e1f1a685cd36274236f7989048b7794b0dec76cf2954bd543f6a645a4fb6fcace24274543bc308921bf2a9c2a7d16ddcda2755917c0c4d223c6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b680c0140377d419b25a2af00a00fac00000000020000000000106600000001000020000000e64543bc2c3f2ee5c717b7547f3a3aba7b3f635ad9e4f71eee31c32301aaa4ce000000000e8000000002000020000000b2c9c0efd25670ffab9e18e3dad5e92ae20b5d11d38395db984f21923e62237b2000000080eeee980b6447826ea2a42c5dbbde9792b4227a132f9c8aa3b31d3e8fb910e240000000ff75db78a130f16152f030dfc45769b51dc0b573baa313ef8a83294e30f0ec7f3f9cd38018e6b8865976d91362aa1a33e332428fa3bf665875a469f9f6a54f3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8413B61-E039-11EE-882F-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3048 2912 iexplore.exe 28 PID 2912 wrote to memory of 3048 2912 iexplore.exe 28 PID 2912 wrote to memory of 3048 2912 iexplore.exe 28 PID 2912 wrote to memory of 3048 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2ae1ec731bfbb6b0ee06a75961c230c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d272dae2bedf86489ac3c834dfca72ec
SHA1d455a5e5c63e1ac7a5fbce9492afa863854ebf86
SHA2567752eff091d42301fd45a549dac0300e89f1ce8fb18202c786aa4477abd414d3
SHA51214ae26d7b619ac21d1adc720437ae0a8dd42ae66d7f139a837ce27492341462c54ecc43bbbbd84d9e6cc99f1a07241fb254678defa6f5d3cd39f1ee77e46cd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57edc28f46634a2c1d9a464fe624143fe
SHA1bc31f54759cbc7409680c35a142604ee2a18d879
SHA2563752220decf004759ae9556a475e9b4f01ffca5492c2726ed69b641e56f4224b
SHA512d72885050e8dd6c98a892336871b9b235574903fb66cf2f3cb4b8dd68d804fec1a8b9bf7d8f2d1cc37c96de0e38242ba5a174ce16b460128f90e01edd60411e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fa89e2291cf5f2116544d1b26c58e4
SHA182ea3e7ff4f9697f5bec18c4d9a1e96ca52f809e
SHA2569a5b4ff5e6a7e2b945d65e1037d8929cf9057ead6109ebecd43a69cbe1d10274
SHA512c9d7459aa2f6e0629aea232ecfe36b48f05d92d08d456ec7b1ccf309cd87c45099ce3155209d387c0baffcb93cb40128de374a260ffa792f4575e822e2c892cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51272947618799a1c528eccc7d1daeea8
SHA12a62368e3118fcce916df585cef0bcedbf154d73
SHA256f9b9b73c28e2bd34c7c72395c33171761cf780f0f2562a7a8b73667d9aac2907
SHA5128982fcdd3ebea15a3a1ba041982e65ddc5c94ebcc5e72a65587e67d8e25cd62e0689d245ba48c08ae5b73ba37cd58c867a0ffbb1fb416b20d40d385a059028ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56099e04dd99e8f88eeb56c40265ff7c1
SHA18ee5dae64406369ca771f2ace9a1cef32d9fe675
SHA256ebaa2425ff6baca97f01a6488898e1592a15e79c80afb0d03ed818eba48a9d2a
SHA512fce1690baccd74932e0a30a0716c32d8bd3edc8bf2fb6d342305db56d2790e5d1bfeb736032862e4fc09f0a3150210c1ea3fc1ecc393a9b0c58111e64b70e3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e117d3d094e9b8293aa716165ea8821
SHA140795bace6757ecbdf799b69621aa884617c4c52
SHA256d40707b965f3dfb8094442b9c1cb89bf35746b83e674a4f5380cf436965dd24a
SHA5125a5bbed99e681e893167a2b3d6c882912dab88aab685fd84ecdda6b60a9e283b2684d2c94005566a980e793a4ff94792b1f585b4eda21c6af5d34659e591f2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3582013000d485668b23c1d55edc55
SHA16b6ce610f315fd855d20b1a55f6b6d4af4f52741
SHA25605cc0520330cf5f44e91a2480c1b0f5dcc6cd2d94d5d4060eb9ca1946be40ee1
SHA5128272982f37a95f289b7e223a080b79680cb313e78d4cbd0c59dbf569ba47b4143c4e61b32ef947e662b514f9f11af9b7fb9fa4d81319d0d6c4280ed00c6dc03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f30a28d78eb1ff569c351cdd020495c
SHA1209ece1a135515051ed7a93119009bfb79cd41b1
SHA2566d162a9bcae9423af52703dcd5dc9cf56f0dbdd8ea05c268a76a29cd59142584
SHA512f3cdbedf003f3b83894e4af6a295b692a67f00ea20e2c9c3a0a8eba45c33afaa5cdd77115db514786a73f49b2172d884180402da285cf25dc5060b45b4b9aef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b74e40403154d643ea1ae2a697c8a63
SHA1a5e0918c2387d4478903d1285adefff4adfe71cf
SHA256f5618815e4e1d22b7be148ea4099e677b2a491bba843f6cad2aa225d38075a9d
SHA51206b3d6143154579ca156a81be1bdc09ce9ede249b8fa0ac0f06aa129d8651fbea498fe9aa18f73fdb48c349dea6d16fe5bad979c444cf2073d079eddd2f9b17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf51b20680d9cc824fe3e0cdea4c2bc
SHA14bd7bf7ad5c23119656aa74171aaffd2ebda87ab
SHA256fe70caa91675eb47c3e06899ef7cfdac09a514bfe789df1ef587798d1e66c81c
SHA512dac7ac6ea3c40d7c6fa0443e20aeec323538790c4adbf38680209234b2f9e68f240ed3e23016d173fe990eb0eb4c278179c9cad7f94916141bf088bd62cd098f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573717b3adea520d22d542298429535eb
SHA15fede781f7f7b26bb9cf953008ba6a4c31ffae3c
SHA256056c0131a9606431fd12cfe6d12ac17f603054f7c5d576f502de9c00fc36938e
SHA512b85a661c6e34067cab5f592cbcfbd25ec0de269e1f5012ec381e203a86fd21ff80f4f7b28d64dd96840db597b7084db1576da894bc44fb9173eedc52bc288693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5777266aa4390a15e8bd75e16e790494f
SHA1d0b0a515024d348d3eafa94449c122af6014cc04
SHA2562f4290f3f7d5741222d9769da14a73f5b88a933aa3f29f8c16ddb85d9b2a5275
SHA512a6ee835b13cc850bdae686a360d1b12a927031a9de181188793a52f0f2ed2cd6a9c1b4fb7ffa2a37ec9d83fa4921848bee427d783c9f1a2978112408bdea9ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58b98bada17b0eecc87d51bb6f0dd5d57
SHA181160b4dbede61d53183449550b688daf7f1ad0e
SHA256e7f73d0b848755ec066ffa7eb280b1288d51c9cdf0c6079a20cef4ceb49bde64
SHA5129c59665d89b117f828b180e6abafba8c35148fcf4b72e7f9b25a2494dce4f65d26ad6e9b50b3db9c1a50caba50190a8c852e0c04839d8b01ce56e52ef4f0382c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63